GLOBAL CONTROL and CENSORSHIP 3.10.2015 –1.5.2016 ZKM Atrium 1+2, 1St Floor
Total Page:16
File Type:pdf, Size:1020Kb
THE NEW ART EVENT IN THE DIGITAL AGE GLOBAL CONTROL AND CENSORSHIP 3.10.2015 –1.5.2016 ZKM_Atrium 1+2, 1st floor control_bruchuere_E_20150928-1.indd 1 28.09.15 11:20 Halil Altındere, Mobese, 2011, Photo: Murat Germen Fidel García, 28%, 2009 control_bruchuere_E_20150928-1.indd 2 28.09.15 11:20 Zach Blas, Facial Weaponization Suite, 2011–2014 aaajiao, GFWlist, 2010 control_bruchuere_E_20150928-1.indd 1 28.09.15 11:20 YOUNG-HAE CHANG HEAVY INDUSTRIES, CUNNILINGUS IN NORTH KOREA, 2003 James Coupe, SWARM, 2013 Chen Ching-Yao, International Radio Exercise Taiwan Version, 2012 control_bruchuere_E_20150928-1.indd 2 28.09.15 11:20 Benjamin Gaulon, 2.4 GHz from Surveillance to Broad- cast, 2008 – ongoing Anca Benera & Arnold Estefan, Urban Wildlife: The Human Influence on the Social Life of Birds, 2013 control_bruchuere_E_20150928-1.indd 3 28.09.15 11:20 Jonathon Keats and Team Titanic, The Century Camera, 2014 Kenneth Tin-Kin Hung, The Travelogue of Dr. Brain Damages, 2011 control_bruchuere_E_20150928-1.indd 4 28.09.15 11:20 Laurent Grasso, On Air, 2009–2012 Erik Mátrai, Turul, 2012 Marc Lee, Me, 2015 control_bruchuere_E_20150928-1.indd 5 28.09.15 11:20 GLOBAL CONTROL AND CENSORSHIP GLOBAL CONTROL AND CENSORSHIP Bernhard Serexhe Knowledge is power. And power is above all possessed by whoever controls the flow of information. This applies particularly to digital culture, because all the information on the World Wide Web can be surveilled and manipulated, unhindered. That mobile communication devices have been enthusiastically embraced means, that these days, billions of people all over the world are connected to each other. Billions of all kinds of con- tent and data are generated every day and transmitted across the globe within seconds. Even before it reaches the recipients, mas- sive amounts of this data are intercepted by private companies and government agencies, checked, and then used for their purposes. Whereas not so long ago digital forms of communication were seen as the hope for new forms of democratic participation, they have recently been converted and perverted into ideal door openers for the perfect surveillance and control of billions of people. Those who use such devices are being used. This is the proviso to which we have all acquiesced in order to profit from these conve- nient forms of communication. Smartphones, which accompany their users with every step they take, are infected with spyware without their owners’ consent or knowledge, and can be used as surveillance cameras and listening devices even when they are turned off. Our locations and movement profiles can be accessed at any time. Our browsing and consumer behavior, our contacts, our preferences, and our weaknesses can be analyzed and passed on at any time without us knowing or being asked. Surveillance and censorship are mutually dependent; they cannot be viewed separately. The surveillance of citizens, institutions, and companies – yes, including the monitoring of democratically elected politicians and parliaments or of journalists and lawyers – has always been an open secret, that this is the mission of gov- ernment agencies. Recently, however, this historical practice of government-legitimized spying on all citizens has been expanded to include spying by powerful service contractors and economic enterprises. And parallel to this, for passing on important informa- tion to the general public by courageous citizens and journalists, their disclosures even of illegal surveillance, and drawing attention to censorship and torture by government institutions, these people are now being prosecuted and punished in the strongest possible terms. The paramount importance of an exhibition on this subject is evi- denced every single day. The media reports daily on new cases of spying and the massive interference with disclosing precisely these 6 control_bruchuere_E_20150928-1.indd 6 28.09.15 11:20 PREFACE practices. It can no longer be denied that in Germany, too, state agencies on the orders of and sanctioned by the government itself, have taken action contrary to the welfare of citizens and the econ- omy. Parliamentary investigation committees are refused access to documents which would lead to the solving of such cases. In totalitarian states, whistle-blowers disappear – they are kidnapped or even assassinated – but the danger that even in Germany they may find themselves prosecuted for treason, has recently increased dramatically. Besides direct measures to exercise influence and punish, the sur- veillance apparatus always uses fear as the most effective instru- ment. From Olympus to the Old Testament, from the Pharaohs to the Inquisition, in all religions and governmental systems from antiquity to the present, surveillance always referenced God Al- mighty or the gods. The total control of individuals always took place preemptively in the form of self-censorship resulting from fear. When this mechanism did not work, in their presumptuous omnipotence as representatives of God, both religious and worldly rulers have always had recourse to ubiquitous spy systems to iden- tify and locate people who think differently, and to mete out the punishment they are supposed to deserve. Thus, up to the end of the eighteenth century, the writings and correspondence of scholars and scientists who were deemed suspicious were intercepted, evaluated, manipulated, and used against the sender by the Inquisition – often with devastating con- sequences for them. In 1415, Jan Hus was burned at the stake in Konstanz for heresy against the teachings of the Catholic Church. In 1600, Giordano Bruno was burnt at the stake on the Campo dei Fiori in Rome for heresy because he denied several Catholic core doctrines based on Aristotle’s natural philosophy. It was not so much about Bruno himself, but rather about setting a public example, which would supposedly deter others from publishing what they knew. In 1633, after the Inquisition threatened him with the same fate as Bruno, Galileo Galilei was forced to retract his scientific findings, which were contrary to official church doctrine: for the Roman Catholic Church the Earth was the center of the universe around which the other celestial bodies revolved. Today, in the year 2015, writers and journalists critical of the sys- tem and whistle-blowers are branded as traitors; they are pursued across all continents, threatened with bans on publishing their work, with house arrest and travel bans, with life imprisonment or even death. After the control regime of the Nazis, which culminated in the anni- hilation of millions of people, George Orwell’s Big Brother became a metaphor for the God-like, omnipresent, totalitarian authority of state control by means of electronic media. Under Stalin’s dictator- ship, no different to the USA in the anti-Communist McCarthy era, millions of people were hounded and persecuted because of their opinions and beliefs, incarcerated in prisons and camps, t ortured, 7 control_bruchuere_E_20150928-1.indd 7 28.09.15 11:20 GLOBAL CONTROL AND CENSORSHIP and killed. The dictatorships of Franco in Spain and Salazar in Por- tugal, the regimes of Pinochet, Suharto, and Ceaușescu, to name but a few examples, were only able to survive because of the sur- veillance and intimidation of the populace; the same applied to East Germany, which owed its continued existence until 1989 to the Ministry for State Security’s blanket system of informers. At the latest since 1947, the global espionage network Echelon op- erated by the Five Eyes – USA, Canada, Great Britain, Australia, and New Zealand – has focused on spying on political, commer- cial, and private communications traffic, both in the East and the West. Since the end of the Second World War the Federal German Government has known and sanctioned that the Allied Powers in Germany systematically monitor all postal, telephone, and radio communications. The people were told this was to counter the Communist threat: today it is ostensibly to wage “war on terror.” For around thirty years now digital networks have enabled auto- mated, targeted blanket interception, manipulation, and storing of information available on the Internet as well as targeted spying on users worldwide and 24/7. The courageous disclosures of Ed- ward Snowden and other whistle-blowers have made it very clear that this capability of total electronic surveillance by intelligence agencies in the East and the West has been developed and is im- plemented on the broadest possible basis. Super-efficient spying software is developed with the aid of state funding at German universities and prestigious private sector research institutions as a new form of weapons technology; it is a lucrative business for German companies with totalitarian states from all over the world. Just how all-encompassing digital surveillance and censorship function today was revealed in July 2014 when the CIA admitted it had manipulated the computers of the U.S. Congress committee that is tasked with democratic control of the CIA. The manipulation included deleting documents about torture conducted by the CIA, which the committee was investigating. That digital surveillance functions perfectly in Germany as well is evidenced by the recent revelations that several thousand com- puters of the German Bundestag and prominent politicians had been successfully hacked for years. After the NSA admitted they had even hacked Chancellor Merkel’s mobile phone to spy on her, it is likely that the attacks on the Bundestag and politicians, which are still ongoing, were also carried out by the intelligence services of foreign nations. It is a matter of grave concern that such spying activities in Germany – possibly also by “friendly” powers – are not being vigorously prosecuted. For a long time now the Five Eyes states as well as other nations have granted themselves the right to spy on all other nations: in all military, economic, and social areas, and at all levels – government, organizations, business concerns, activists, NGOs, and individual citizens. The motto is: If it’s technically possible to do, it will be done.